2024-03-29T11:49:40Z
https://vfast.org/journals/index.php/index/oai
oai:vfast.org:article/26
2013-06-22T00:46:00Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/27
2020-10-04T00:46:01Z
VTCS:ART
"130710 2013 eng "
2308-8168
2411-6335
dc
SMART GRIDS: A prologue & unscrew challenges that needs to be addressed, A Short Survey on how to make Grids Smarter:
Zakarya, Muhammad
Abdul Wali Khan University, Mardan
A Smart Grid (SG1 ) is an intellectual and logical electricity network that integrates the actions of all users connected to it and makes use of sophisticated and highly advanced information, control, and communications technologies to save energy, reduce expenditure and increase reliability and transparency. A smart grid can reduce energy cost; it makes energy usage efficient that result in a short term solution for the energy crisis. It also helps the distribution systems for better energy management and control. The field of Information & Communication Technology (ICT4 ) and computer technology can play a major role in this hazardous situation all over the world. This paper presents current research issues and challenges that need to be addressed for reliable, efficient and flexible load distribution (LD2 ) and management for smart grid design. The paper also presents some security & privacy issues that inform the grid station (GS3 ) about consumer’s habits and personnel information. The article also tries to highlight major research issues in smart grid technology, which are helpful for the new researchers to find new research directions in this field & technology.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/27
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/28
2022-04-20T11:59:29Z
VTCS:ART
"130710 2013 eng "
2308-8168
2411-6335
dc
TOWARDS THE RAILWAY TRAFFIC MANAGEMENT USING MOBILE AGENTS
Shinwari, Muhsina
Shaheed Zulfiqar Ali Bhutto Institute of Science and Technology Islamabad, Pakistan
Mobile Agent is a chunk of code that travels along a network from one host carrying its state of execution to another provides an execution environment. Mobile agents being programmed with decision making ability which can identify its route along a network. In this paper we present an agent based conceptual model for the railway traffic detection and management. The proposed model attempts to tackle with the bidirectional railway track conflict resolution using mobile agents for messaging and communication. The base system being the Centralized Traffic Control System, can efficiently ensures the smooth flow of traffic. The model also incorporated the accidents scenarios. In the end architectural model for both agent-owner and host are presented based on the given conceptual model.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/28
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/34
2020-10-04T00:46:01Z
VTCS:ART
"130710 2013 eng "
2308-8168
2411-6335
dc
A Short Overview of Service Discovery Protocols for MANETS
Zakarya, Muhammad
Abdul Wali Khan University, Mardan
Rahman, Izaz ur
Department of Information, Computing & Mathematics, Brunel University, London, UK
MANETs (Mobile Ad Hoc Networks) are infrastructure-less, temporary wireless networks, consisting of several stations. No specific topology is defined in MANETs. MANETs have various applications in computer networks, such as providing communication in a domicile lacking network groundwork and proper infrastructure. In a MANET, a data packet may crisscross numerous hops until reaching its target location, making it exposed to various network attacks. The packets in a MANET are exposed to various packet dropping attacks. Mobility is there but security is the main issue still. The technology used for finding, advertising services to other nodes in the network is Service Discovery. Different Protocols are available for Service Discovery. Our focus in this paper will be on Service Discovery, available Service Discovery Architecture & their modes of operation, some proposed protocols. We will discuss Mobile Service Discovery Protocol (MSDP), which have steady performance & reduced massage overhead. Currently there is a diversity of service discovery protocols, most important Jini, SLP, Salutation, MSDP, Chord and UPnP. Bluetooth has also a slightly modest service discovery protocol. We have compared these tactics and listed their benefits and weaknesses.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/34
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/35
2020-10-04T00:46:01Z
VTCS:ART
"130710 2013 eng "
2308-8168
2411-6335
dc
Extended DDoS Confirmation & Attack Packet Dropping Algorithm in On-Demand Grid Computing Platform
Zakarya, Muhammad
DDoS attacks are thrown through carriage of a large amount of packets to an objective machine, using instantaneous teamwork of numerous hosts which are scattered throughout the Grid computing environment. Nowadays DDoS attacks on the Internet in general and particularly in Grid computing environment has become a visible issue in computer networks and communications. DDoS attacks are cool to provoke but their uncovering is a very problematic and grim task and therefore, an eye-catching weapon for hackers. DDoS torrents do not have familiar characteristics; therefore currently existing IDS cannot identify and discover these attacks perfectly. Correspondingly, there implementation is a puzzling task. In practice, Gossip based DDoS attacks detection apparatus are used to detect such types of attacks in computer networks, by exchanging stream of traffic over line. Gossip based techniques results in network overcrowding and have upstairs of superfluous and additional packets. Keeping the above drawbacks in mind, we have proposed a DDoS detection and prevention mechanism in [1], that has the attractiveness of being easy to adapt and more trustworthy than existing counterparts. We have introduced entropy based detection mechanism for DDoS attack detection. Our proposed solution has no overhead of extra packets, hence resulting in good QoS. Once DDoS is detected, any prevention technique can be used to prevent DDoS in Grid environment. In this paper we are going to extend our idea. A confirmation mechanism is introduced herewith.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/35
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/38
2020-10-04T00:46:01Z
VTCS:ART
"130710 2013 eng "
2308-8168
2411-6335
dc
Computer Network Protocols Convergence Under Secure and Non Secure Environment
Khan, Murad
School of Electrical Engineering and Computer Science, Kyungpook National University, Daegu, S. Korea
Ahmad, Awais
School of Electrical Engineering and Computer Science, Kyungpook National University, Daegu, S. Korea
Park, Gissukyun
School of Electrical Engineering and Computer Science, Kyungpook National University, Daegu, S. Korea
Routing protocols play an important role in the design of an efficient network. These routingprotocols include security issues i.e. false packet injections, routing table poisoning etc. In the last decade, a lot of research has been done in improving the security of these routing protocols. In this paper, we have compared Enhances Interior Gateway Routing Protocol (EIGRP) andOpen Shortest Path First(OSPF) routing protocols in secure and non-secure scenarios. Main focus is to estimate the overall behavior of routing protocols after establishing correlation among them and on the basis of convergence under secure and non-secureenvironment. The comparison result shows that OSPF has better performance in both secure and non-secure scenarios.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/38
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/49
2020-10-04T00:46:01Z
VTCS:ART
"130924 2013 eng "
2308-8168
2411-6335
dc
MACHINE LEARNING CASCADE ALGORITHM FOR ANALYZING SHELF LIFE OF PROCESSED CHEESE
Goyal, Sumit
N.D.R.I.
Goyal, Gyanendra Kumar
N.D.R.I.
This paper highlights the significance of cascade single layer models for predicting the shelf life of processed cheese stored at 7-8oC. Mean square error, root mean square error, coefficient of determination and nash–sutcliffe coefficient were used for testing the prediction ability of the developed models. The developed cascade model with a combination of 5à8à1 showed excellent agreement between the actual and the predicted values, suggesting that single layer cascade models are efficient in predicting the shelf life of processed cheese.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/49
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:vfast.org:article/72
2014-01-23T09:33:44Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/76
2020-10-04T00:46:01Z
VTCS:ART
"130924 2013 eng "
2308-8168
2411-6335
dc
SURVEY OF HISTORY BASED ROUTING PROTOCOLS IN DELAY TOLERANT NETWORK
FIDA, MAH-RUKH
Department of Computer Science, Shaheed Benazir Bhutto Women University, Peshawar
Frequent changes in topology and the lack of infrastructure compel disrupted networks to avoid the use of traditional routing protocols. Rather than defining paths towards destinations, the routing tables store access chances of known nodes towards a specific destination. History of a node’s encounter is maintained in three different ways to find out its power of access to the rest of network nodes. The survey paper discusses various routing schemes based on the past encounter patterns of network nodes.
Keywords: (Delay Tolerant Network) DTN; routing protocols; history-based routing; frequency; encounter; inter-contact duration; recency.
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/76
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/99
2020-10-04T00:46:01Z
VTCS:ART
"131223 2013 eng "
2308-8168
2411-6335
dc
Impact Agile Project Management: Identification And Analysis Of Problems In Scrum Implementation
ASHRAF, MUHAMMAD
ALI, NATASH
Due to its novelty, flexibility and productivity the Agile Methodologies have gained much popularity and attention of the industry practitioners, designer and developers along with researchers and writers. It has become a hot topic among stakeholders over the last few years. Out of many agile methodologies Scrum has become on the top of list being a frame work. While adopting Scrum frame work, one of the scrum role i: Scrum teem have to overcome a number of problems and hurdles related to Scrum HRM (Human Resources), Scrum QA(Quality Assurance), Scrum Ceremonies, and Scrum artifacts aspects of the Agile project management in implementing Scrum. The research paper identified these problems using a survey and focus group discussion of experts of the field conducted in a software project company and through systematic review of related literature . The results and recommendations will be discussed in the paper. The results may be used by other software development companies of the area for streamlining their project management using agile methodologies
VFAST-Research Platform
2013-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/99
VAWKUM Transactions on Computer Sciences; Vol. 1 No. 1 (2013): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/100
2020-10-04T01:38:43Z
VTCS:ART
"140125 2014 eng "
2308-8168
2411-6335
dc
A Methodological Approach: Formal Specification Of Quality Attributes Modeling Approcahes In The Waterfall Process Model
RASHID, UMER
The fields like Software Engineering (SE) and Human Computer Interaction (HCI) are considered dissimilar.. SE based process model mostly discuss modeling of functional requirement while the HCI based approaches are mostly concerned with the modeling of quality attributes. The quality attributes are mostly discussed during late phases of software development. The non-functional requirements as quality attributes can be integrated in software products by considering quality or non-functional modeling approaches during all of the phases of software engineering process model. The separation of SE and HCI concerns restricts formal specification of quality attributes during all of the phases of SE process model. The software systems or products are generally less user centered because SE process models can’t address formal specification of quality attributes in SE process models. In this research a methodology for the formal specification of approaches that model functional requirements and quality attribute during SE process model is proposed. The proposed methodology is based on waterfall SE process model. It can be utilized in design and development of users centered software products. Our proposed methodology also bridges gap between SE and HCI fields.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/100
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/101
2020-10-04T01:38:43Z
VTCS:ART
"140124 2014 eng "
2308-8168
2411-6335
dc
A Comprehensive Study Of Energy Efficient Routing In Wsn Towards Qos
AHMAD, SHAKEEL
SHAHZAD, ASIM
ALI, NATASH
The Wireless Sensor Network (WSN) is an emerging field of wireless network comprising of few to many autonomous tiny sensors nodes, with limited processing, limited memory, limited battery power, limited bandwidth and limited wireless transmission capabilities. The life time of the sensor node depends upon the battery power. WSN are commonly used to monitor environmental conditions like temperature, sound and pressure etc. WSN is an application of MANET. Wireless sensor node collects data and sends back to the sink or Base Station (BS). Data transmission is normally multi-hop among sensor nodes that enable these nodes to transmit data from hop to hop towards the sink or BS. Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. Main penalty area of researchers is to design the energy efficient routing protocol. Routing protocols should be energy efficient, scalable and prolong the network lifetime.But Quality of Service QoS is also a challenge for energy efficient routing protocols for researchers. QoSneeds a multi-layerlinespanning using the different layer protocol architecture. In this paper, we enlighten the energy efficient routing towards QoS in WSNs and proposes a solutionfor the QoS layer in energy efficient routing techniques in WSNs and finally, highlight some open problems and future direction of research for given that QoS in WSNs.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/101
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/102
2020-10-04T01:38:43Z
VTCS:ART
"140124 2014 eng "
2308-8168
2411-6335
dc
Cognitive Storage Model And Mapping With Classical Data Structures
WAHAB, ABDUL
ABID, ADNAN
IQBAL, AMJAD
Memories are the internal mental records that we maintain .Human mind is a very complex organ.. Processing depends on how we memorize information, events and how we recall things and use them efficiently in situations when required. It can be related that for Storage in mind we use different data structures for storing variety of information. We remember the names of known persons, and the people we met more frequently.The Topics in book, Months of the year, our CNIC Number, the way we learn words of a new language etc. Recently invented data structures e.g skiplist [1] show much similarity of how the brain store the information. So we can say Careful study of how the cognitive storage works could lead to the discovery of the new data structures In this paper we have attempted to relate the existing data structures with how we store information in mind.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/102
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/103
2020-10-04T01:38:43Z
VTCS:ART
"140124 2014 eng "
2308-8168
2411-6335
dc
Comparisons Of Membership Functions For Fuzzy Rules
NAZIR, SHAH
NAZIR, MUHAMMAD
Different methodologies have been used to design and model a system which having the ability to make decision in uncertain and indecisive situation. In this paper we present the comparisons of membership and reduced membership functions for fuzzy rules. A model of different fuzzy rules is designed for three membership functions (mf) and then reduced the fuzzy rules by reducing the mf.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/103
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/105
2020-10-04T01:38:43Z
VTCS:ART
"140124 2014 eng "
2308-8168
2411-6335
dc
A Comparative Analysis Of Conventional Software Development Approaches Vs. Formal Methods In Call Distribution Systems
SIDDIQUI, MUHAMMAD AJMAL
AKHTER, MUHAMMAD SALEEM
MIAN, NATASH ALI
When we think about formal method; the first thing which comes in our mind is mathematical approach. The process of formalization is an approach based on mathematics and used to elaborate the properties of systems (hardware and software). The mathematical modeling or formal methods provide us a framework for large and complex systems. Thus these systems can be specified, analyzed, designed, and verified in a systematic way rather than the approaches which are used conventionally. Formal verification and the methods are applied using theoretical computer science fundamentals to solve the complex and difficult problems in large and complex software and hardware systems to ensure the systems will not fail with run-time errors. Conventional approaches of software verification in call distribution systems rely on quality assurance to verify the system behavior and robustness. The process of software testing cannot show the absence of errors it can only show the presence of errors in software systems. [1] In contrast, the mathematically-based techniques of verification are based on formal methods to prove certain software attributes, for example proving that software does or does not contain the occurrence of errors at run-time such as overflows, divide-by-zero, and access violation, invalid memory access and stack/heap corruption. [1] In this paper later we will have comparative analysis of formal methods vs. conventional software development approaches in call distribution systems. Using this comparison we‘ll try to identify the methodologies and approaches which would be better in SDLC for call distribution systems.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/105
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/106
2020-10-04T01:38:43Z
VTCS:ART
"140124 2014 eng "
2308-8168
2411-6335
dc
Comparative Analysis Of Cloud Computing Security Issues
MUJAHID, AKRAM
MAHMOOD, TARIQ
IQBAL, WASEEM
Almost all the organizations are seriously thinking to adopt the cloud computingservices, seeing its benefits in terms of cost, accessibility, availability, flexibility andhighly automated process of updation. Cloud Computing enhance the current capabilitiesdynamically without further investment. Cloud Computing is a band of resources, applicationsand services. In cloud computing customer’s access IT related services in terms of infrastructure platform and software without getting knowledge of underlying technologies. With the executionof cloud computing, organizations have strong concerns about the security of their data.Organizations are hesitating to take initiatives in the deployment of their businesses due to data security problem. This paper gives an overview of cloud computing and analysis of security issues in cloud computing.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/106
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:vfast.org:article/107
2014-10-26T11:06:52Z
VTCS:ART
oai:ojs.localhost:article/108
2020-09-29T07:31:36Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/152
2022-04-20T12:02:54Z
VTCS:ART
"160504 2016 eng "
2308-8168
2411-6335
dc
Reducing Flooding of Zone Routing Protocol in Mobile Ad-Hoc Networks
AHMAD, ISHAQ
Abdul Wali Khan University Mardan
Barukab, Omar M.
Department of Information Technology, Faculty of Computing and Information Technology – Rabigh, King Abdulaziz Univeristy, Saudi Arabia
Mobile ad-hoc networks (MANETs) are temporary networks without any pre-existing infrastructure in which nodes are connected through wireless channels. There is no centralized administration in this network because nodes are not fixed at their locations, they are continuously moving to different locations. Each node in MANETs has dynamic capabilities because at one point acts as a host while in some other time becomes a router which can forward messages on the network to other nodes. One of the complicated issues in MANETs is routing due to their dynamic topology which is frequently changes due to the mobility of nodes. In order to forward packets in this complex topology using optimal routes, there is a need for efficient routing protocols. There are three categories of routing protocols in MANETs named as reactive, proactive and hybrid respectively. We have used a hybrid type protocol named Zone Routing Protocol (ZRP) for routing in our research. In order to control unwanted flooding in the overlapping zones of ZRP, we have proposed a selective broadcasting technique for route discovery. In this technique route discovery exchange messages are highly reduced in the outer zone of the ZRP.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/152
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/157
2020-10-04T01:38:43Z
VTCS:ART
"141014 2014 eng "
2308-8168
2411-6335
dc
A Hybrid Model By Integrating Scrum And RAD
Ain, Qurat -ul-
Virtual University of Pakistan
Among various software development models, the focus of agile models is disciplined management projects, an approach that enforces self association, collaboration and liability. Agile models adopt a business alignment that supports development with chump needs and aggregation goals. Extreme Programming (XP) and Scrum are often used models of agile whereas Rapid Application Development (RAD) is a conventional plan driven software development model. The purpose of introducing RAD is to include functionality to an application. Strengths of Scrum and RAD are that they are self managed processes through iterative planning. Basically RAD is the advanced version of XP that’s why XP is also included just for reference. This research work is intended to analyze the strengths, characteristics and weaknesses of Scrum, RAD and RAD models. The paper also explains the disciplines and phases of RAD that can enhance the robustness of RAD and Scrum models. It will also propose a narrative hybrid model that combines RAD, Scrum and RAD to strengthen their features and removing their weaknesses.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/157
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/163
2020-10-04T01:38:43Z
VTCS:ART
"141206 2014 eng "
2308-8168
2411-6335
dc
Search for Excellence & Performance -Multicore Processors
Ain, Qurat -ul-
Virtual University of Pakistan
New trend for achieving high performance in processors history as well as evolutionary change in the world of IT has revolutionized the concept of speed and performance in industry .The best way to enhance performance is the way to add multiple cores. To take full advantage of Multi-core processors require some means of dividing work among the cores. It’s up to industry to overcome the problem of programming and hardware to take the full advantage of multi cores. With the passage of time, Pc’s have become rifer and a large number of applications have been designed for the PC’s and end-users and application programmers need more faster and more powerful system capable of performing by trillions of instruction with low price and high performance. A number of factors have achieved speed by increasing clock speed, adding multiple cores but on the same chip. But here the time is not on end all the manufacturers moves upon to use multiple cores. Multi core simulations helped to understand the communication overhead.
This paper will describe how far industry has progressed and evaluates some challenges that industry faces with multi-core processors. The focus of this paper is on defining a relationship between performance and power level of multicore processors and single core processors by defining complete history of processors and what the reason behind the innovation of multi-cores was? How they help to achieve highest performance?
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/163
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/240
2020-10-04T01:38:43Z
VTCS:ART
"141213 2014 eng "
2308-8168
2411-6335
dc
PARALLEL LOSSLESS IMAGE COMPRESSION USING MPI
Durad, Hanif
Pakistan Institute of engineering and Applied Sciences, Islamabad, Pakistan
Kazmi, Waqas
Pakistan Institute of engineering and Applied Sciences, Islamabad, Pakistan
Akhtar, Muhammad Naveed
Pakistan Institute of engineering and Applied Sciences, Islamabad, Pakistan
In lossless compression techniques, perfectly identical copy of the original image can be reconstructed from the compressed image. The paper implements three lossless compression techniques namely Huffman Encoding, Run Length Encoding and DPCM techniques using MPI. The experimental results show considerable reduction in execution time and better compression ratio for certain types of images.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/240
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/254
2020-10-04T01:38:43Z
VTCS:ART
"141213 2014 eng "
2308-8168
2411-6335
dc
SCALABLITY ANALYSIS OF MPLS LABEL DISTRIBUTION PROTOCOLS RSVP
Rehaman, Ghani
khushal khan khattak university karak
MPLS has a choice of two signalling protocols CR-LDP and RSVP-TE. Both protocols have the ability to provide QoS, constraint based routing, explicit routing and traffic
engineering in the core network. In this paper both signalling protocols performance is analyzed and its conclusion helps ISP and carrier providers to make a better choice of signalling protocol as per their needs. The paper reviews the pros and cons of both signalling protocols and then compares the CR-LDP and RVSP-TE in term of bandwidth and throughput of a link for a small and large scale network using video traffic.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/254
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.localhost:article/255
2015-02-26T13:21:52Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/256
2020-10-04T01:38:43Z
VTCS:ART
"141213 2014 eng "
2308-8168
2411-6335
dc
Securing HTTP traffic using byte oriented encryption scheme
Haroon, Zahid
Institute of Business and Management Sciences/ Computer Sciences,
The University of Agriculture, Peshawar,
Khyber Pukhtoonkhwa, Pakistan
This paper is using byte oriented encryption scheme for securing HTTP traffic to take less time as compared to HTTPS which is using bib by bit encryption scheme. The resulted data show that it take less time as compared to HTTPS and is more secure as compared to HTTP.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/256
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/257
2020-10-04T01:38:43Z
VTCS:ART
"141213 2014 eng "
2308-8168
2411-6335
dc
Enhanced Layer Based Model in support of Web services Interoperability
Waheed, Shahazada Zeeshan
College of EME NUST, Isalmabad
Azam, Farooq
College of EME NUST, Isalmabad
Web services are the emerging technology used to perform complex tasks. Web services are available over the internet and different application can request a specific service to perform the required tasks. As web services are used by different type of applications having different models and protocols, maintaining the interoperability are very important. In this paper we consider the different techniques, standards and models used to maintain interoperability, i.e. WSDL-S, SOAP engine and UDDI (Universal Description Discovery and Integration)[5]. As web services are used commercially then main issue is the security. Integration layer Model is available that is used in support of interoperability in web services [1]. In this model, layers are divided in to low level (with more interaction) to high level (with less interaction). Main purpose of this paper is to propose the new enhanced based model. This model is based upon the layer architecture, to support message passing between services having different syntax, semantic and underlying platforms.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/257
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/258
2020-10-04T01:38:43Z
VTCS:ART
"140113 2014 eng "
2308-8168
2411-6335
dc
A REVIEW of QURANIC WEB PORTALS THROUGH DATA MINING
Siddiqui, Mohammad Khubeb
College of Computer Engineering and Sciences,Salman bin Abdulaziz University,
Kingdom of Saudi Arabia
In the present era abundant web portals are available over the internet. In the proposed work we concentrate on data mining of Quranic web portals. To know and obtain awareness about Islam, numerous Quranic web portals are being accessed worldwide. Data mining is one of the emerging technologies which analyzes raw data using supervised and unsupervised techniques to find the hidden pattens. This paper is intended to study the access pattern of some of these websites region wise using classification based data mining under which ROC plots have been depicted. The AUC of depicted ROC of considered Islamic web portals are obtained and have been distinguished as to which portal’s prediction is more appropriate. Alexa’s web-site is an effective tool for obtaining the required data about each of these Quranic web portals regions wise. The study is focused to analyze this data and find the reasons for certain preferences.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/258
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/264
2020-10-04T01:38:43Z
VTCS:ART
"141214 2014 eng "
2308-8168
2411-6335
dc
BNMPS: BIOMOLECULAR NANOMACHINE PROTOCOL STACK FOR HUMAN DISEASE DIAGNOSES: A NEW PARADIGM
Ullah, Fasee
Abasyn University, Pakistan
Khan, Imran
Abasyn University, Pakistan
Nanotechnology have many potentials to be used in various research directions for humanity. It is being used in many applications and products nowadays. One of the important application directions for this emerging technology is biomedical science and human body diagnosis. Nanomachine technology is part of the field concerning about creating and maintaining Nanoscale machines capable of performing certain functionalities such as molecule counting [1], molecule shuttling [2] and molecule sensing [3]. Communication between Nanomachines adds more capabilities and allows cooperative and distributed functionalities and form the concept of NanoNetworks [4]. Today’s researchers are trying their best to deploy Nanomachines and NanoNetworks for real-time objectives such as medical purposes. Moreover, the same problem is faced in other fields such as battlefield networks, environmental monitoring, and automation fields. However, due to design issues of Nanomachines such as low computation capability, low processing power, limited storage, imperfect sensing, actuation, and limited networking capabilities, the work done in the field of Nanonetwork communication is inadequate.
In this paper, we present a novel communication protocol stack model for Nanomachines and show how this model can be used in medical applications for human body diagnoses. Our model provides guidance regarding designing protocol stacks for Nanomachines.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/264
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/265
2020-10-04T01:38:43Z
VTCS:ART
"141214 2014 eng "
2308-8168
2411-6335
dc
TOWARDS THE RECOMMENDATION OF HIGHLY RELEVANT LEARNING OBJECTS TO THE LEARNERS
Qamar, Shaina
University of Central Punjab, Lahore
Bashir, Syed Raza
University of Engineering and Technology (UET), Lahore
Learning objects are reusable units of learning that are used for educational purpose. E-learning has now become quite prevalent in learning community, more specifically in the higher education. Teachers and learners play crucial role in the establishment of e-learning community but the system is still not freed of the traditional barriers of the conventional mode of education for the provision of learning contents. The educators and instructional designers are still working on confined repositories for the purpose of authoring learning objects. The learner’s context and behavioral patterns are still not properly integrated in the e-learning system .The study aims to propose architecture for e-learners to get personalized contents in an adaptive fashion. The initial purpose of this study is to perform a quantitative analysis of learning content. The study also contributes to the proper placement of Learning Objects Repository (L.O.R) in the proposed framework and the integration of various tools at the front layer. However the most important contribution of the research is to propose an algorithm that can rank LOs for a learner with reference to his pedagogical needs and learning goals.
VFAST-Research Platform
2014-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/265
VAWKUM Transactions on Computer Sciences; Vol. 2 No. 1 (2014): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/266
2020-10-04T02:07:55Z
VTCS:ART
"150114 2015 eng "
2308-8168
2411-6335
dc
USING ONTOLOGIES FOR THE EMERGENCY RESPONSE SUPPORT: A SURVEY
Ullah, Fasee
Abasyn University, Pakistan
Khan, Imran
Abasyn University, Pakistan
Ontology is an efficient and an adequate way of conceptualization of knowledge representation for real world applications. Ontologies are successfully used in varieties of knowledge domains.
In this paper, we focus on the field of medical ontology knowledge construction and representation. We identified three different medical ontologies classes: Generic, Specific and Mass Casualties Incidents (MCI) medical ontologies. This survey should support the construction of medical Ontologies in future for a better patient treatment. In particular, we survey and focus on the existing medical related ontologies and investigate their suitability for use in Mass Casualties Incidents (MCI).
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/266
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/287
2020-10-04T02:07:55Z
VTCS:ART
"150115 2015 eng "
2308-8168
2411-6335
dc
Code Shifted Reference Based Cooperative Using Multiple Relays In Ultra Wide Band Communication System
Ali Shah, Pir Meher
Department of Electrical Engineering, Iqra National University(INU)Peshawar
Jan, Latif
Department of Electrical Engineering, Iqra National University(INU)Peshawar
Amin, Muhammad
Department of Electrical Engineering, Iqra National University(INU)Peshawar
Khan, Salman
Department of Computer Sciences, Abdul Wali Khan University Mardan, Pakistan
The technology of Ultra Wide band now a days is quite demanding due to the characteristics like its simple architecture , low power consumption and cost reliability but still it faces some deficiencies in term of its design to achieve low complexity and low cost. UWB systems experience problems while using digital signal processing technology and require high sampling frequencies. In this paper, the performance of UWB system in the cooperative communication environment is evaluated in terms of its Bit Error Rate for different number of relays and different average distances from source to destination node. The simulations are performed for both line of sight (LOS) and non-line of sight (NLOS) environment. Results from simulation shows that the performance of the system decreases by increasing average source to destination distance. The simulation results also shows that the system performs better in LOS channel environment as compared to NLOS channel environment. In the end results, it shows that the performance of the system increases by increasing the number of relay nodes to adequately large number.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/287
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/325
2020-10-04T02:07:55Z
VTCS:ART
"150509 2015 eng "
2308-8168
2411-6335
dc
CONSTRAINT BASED NLP ENGINE
KHAN, NABEEL SABIR
Department of Computer Science/SST, University of Management & Technology
Lahore, Pakistan
Abid, Adnan
Department of Computer Science/SST, University of Management & Technology
Lahore, Pakistan
Visual representations are always better than narrations in accordance to children, for better understanding. This is quite advantageous in learning school lessons and it eventually helps in engaging the children and enhancing their imaginative skills. Using natural language processing techniques and along the computer graphics it is possible to bridge the gap between these two individual fields, it will not only eliminate the existing manual labor involved instead it can also give rise to efficient and effective system frameworks that can form a foundation for complex applications. In this paper we present an architecture to design for a NLP engine that can be used for 3D scene generation, the input would be in textual form that would be processed by each module of the natural language processing (NLP) engine. This text would be restricted in terms of the constraint based grammar (CBG), eliminating the maximum occurrence of any ambiguity and easing the noun fragmentation process. Eventually, the output of the NLP engine would be a sentence that fulfills the custom grammatical rules.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/325
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/326
2020-10-04T02:07:55Z
VTCS:ART
"150515 2015 eng "
2308-8168
2411-6335
dc
Manufacturer Oriented Mixed Model Assembly Line Scheduling using Dynamic Programming
Ahmad, Zaheer
Department, Govt. College of Commerce, Shahdra
Yousaf, Shahid
Department of Computer Science, University of Lahore
Assembly lines have very important role in manufacturing. These are used to manufacture large scale series of products. Developments over the period of time changed the assembly lines from single model lines to more convenient systems with some variations including two assembly lines, ‘n’ assembly lines, customer oriented mixed model, multi model and u shaped lines and many more. In this paper attention is focused to develop the model which is used to assemble the three different types of autos which have some common auto parts. The main objective is to design this model to reduce the time when the different types of autos having some common auto parts are assembled. The optimization problem in this paper is solved by using dynamic programming approach. For this purpose six assembly lines are used having ‘n’ number of stations, two assembly lines are specified for each type of auto. Assembly lines are set in such a way that the common auto part of three types must be assembled at the parallel station of the lines
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/326
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/337
2020-10-04T02:07:55Z
VTCS:ART
"150908 2015 eng "
2308-8168
2411-6335
dc
Atexture Classification Using Random Forest And Decision Tree
razooq, mohammed majeed
university kebangsan malaysia
Texture analysis is considered fundamental and important in the fields of pattern recognition, computer vision and image processing. Analysis of the textures involves texture features extraction and selection, and plays an essential role in the classification and segmentation of textural features. In this study have compared two texture classification methods based on the Random Forest (RF) and Decision Tree (DT) classifiers by using a combination method between various extraction features, such as bi-orthogonal wavelet transform, gray level histogram and edge detection. Experiments were conducted on two different databases. The first texture database captured digital images for testing multi-class machining processes, and the second database was collected from the Brodatz album. The results have revealed that RF and DT have yielded higher classification precision.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/337
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/341
2020-10-04T02:07:55Z
VTCS:ART
"150908 2015 eng "
2308-8168
2411-6335
dc
News Headlines Classification Using Probabilistic Approach
Rana, Mazhar Iqbal
Department of Computer and Software Engineering, Bahria University,
Islamabad, Pakistan
Khalid, DR. Shehzad
Department of Computer and Software Engineering, Bahria University,
Islamabad, Pakistan
Abid, Fizza
Department of Computer and Software Engineering, Bahria University,
Islamabad, Pakistan
Ali, Armugh
Department of Computer Sciences, Comsats Institute of Information Technology,
Attock, Pakistan
Durrani, Mehr Yahya
Department of Computer Sciences, Comsats Institute of Information Technology,
Attock, Pakistan
Aadil, Farhan
Department of Computer Sciences, Comsats Institute of Information Technology,
Attock, Pakistan
This paper is aimed at news classification on basis of their headlines. Researchers have worked a lot for carrying out news classification at full text level but work in the domain of news headlines classification exists in very limited ratio, Therefore, after analyzing variety of existing news classification methodologies, a probabilistic framework is presented in this paper for classifying news headlines. News headlines classification process is divided into three modules, headlines pre-processing module, probability learning module, and news headlines classification module. Based on availability of variety of headlines, probabilistic framework is designed, which classifies each news headline to its pre-defined category by calculating its maximum probability in that category. Work has been performed using bag of words approach where each headline is split into words and each word is given a certain probability. Furthermore, it is shown that proposed system gives better accuracy results as compared to existing headline classification systems.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/341
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/356
2020-10-04T02:07:55Z
VTCS:ART
"151012 2015 eng "
2308-8168
2411-6335
dc
Research On Auto Mobile-Pc Upload Images Application Through Bluetooth Using Java
Khan, Salman
Department of Computer Sciences, Abdul Wali Khan University Mardan
Ali, Hashim
Department of Computer Sciences, Abdul Wali Khan University Mardan
Saleem, Salman
Department of Telecommunication Engineering, UET Peshawar
The popularity of java programming is growing continuously, as Java gives an independent, object oriented and multithreaded programming environment.[1] J2ME (Java 2 Micro Edition) is the Most Ubiquitous Application Platform for Mobile Devices and provides a robust flexible environment for all application running on cell phones and also other embedded devices[11][12]. In this paper an application is develop for mobile phone and PC (Personal Computer), using Java programming language. The main function of this application is to transfer images automatically from mobile phone to PC or laptop and also save these images in computer system memory (Hard Disk), whenever mobile phone detect PC or laptop in its Bluetooth range. The mobile phone app save the PC name in its database as server and sends the images to only that PC while the rest of the PC in its Bluetooth range are ignored plus the mobile app also save the sent images name list so that the images are not send twice to PC. This application has been tested on student’s mobile phones in the university premises and shows a promising results and will also be tested on public mobile devices in future studies.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/356
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/372
2020-10-04T02:07:55Z
VTCS:ART
"151109 2015 eng "
2308-8168
2411-6335
dc
The Design Of New Learning Automata For Problem Graph Coloring
Khorramdel, Susan
Babol University Computer Science Graduate Student Tabari, Iran,
Motameni, Homayoun
Faculty Member, Tabari Institute of Higher Education, Babol, Iran,
Ramezani, Farhad
Department of Computer Engineering, Islamic Azad University of Sari, Iran
Graph coloring issue, is one of satisfied existing constraints issues in the literature of artificial intelligence. Coloration apical includes assigning color to node graph so that any two adjacent vertices are isochromatic. The minimum number (colors numbers) that we assign to these graphs for coloring are called number of color. This issue is from the group of very difficult issue, NP – complete. Given the importance of graph coloring issue and its many uses, many algorithms suggested finding allowed coloration in graph. Among these can be noted in, exact algorithms, distributed algorithms, parallel algorithms, approximation algorithms and heuristic algorithms, …The concept of learning Automata at first was introduced by Tstlyn. He was interested in modeling the behavior of biological systems, and definite automata worked in a random environment, introduced as a model for learning. The aim of this research is to present new algorithm on the basis of learning automata to color with accuracy and high speed and the ability to learn graph vertices. The proposed method also has transfer chart and individual performance and this method was examined on the graph with low vertices and high vertices and medium vertices, on the bottom, a number of works steps and total dyes used for coloring of specific graph with optimization algorithms were matched. Evaluation results show high accuracy, speed and its performance of the proposed method is superior to other optimization methods.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/372
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/382
2020-10-04T02:07:55Z
VTCS:ART
"151204 2015 eng "
2308-8168
2411-6335
dc
Usability Evaluation of an Educational Website in Saudi Arabia
Gul, Hina
Iqbal, sardar zafar
Saqib, Madeeha
Despite the widespread use of online applications and websites, inadequate attention is paid to their usability aspect. Always there is a need to evaluate the usability of these applications and website specially the educational one to improve their user friendliness. The idea behind this research is to evaluate the usability of an educational website in Saudi Arabia. For this research we have considered a number of ways of usability evaluation, but find user based method [7] specifically Heuristic evaluation method to be easier and more cost-effective way to evaluate the usability of educational websites. A questionnaire was developed to accumulate the data. Then survey is conducted based on this questionnaire, by providing this questionnaire to different undergraduate students in one of the universities in Saudi Arabia.Despite the widespread use of online applications and websites, inadequate attention is paid to their usability aspect. Always there is a need to evaluate the usability of these applications and website specially the educational one to improve their user friendliness. The idea behind this research is to evaluate the usability of an educational website in Saudi Arabia. For this research we have considered a number of ways of usability evaluation, but find user based method [7] specifically Heuristic evaluation method to be easier and more cost effective way to evaluate the usability of educational websites. A questionnaire was developed to accumulate the data. Then survey is conducted based on this questionnaire, by providing this questionnaire to different undergraduate students in one of the universities in Saudi Arabia.
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/382
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/385
2020-10-04T02:07:55Z
VTCS:ART
"151205 2015 eng "
2308-8168
2411-6335
dc
The SER Analysis of Rayleigh, Rician and Nakagami Channels at Various Relay Locations in Cooperative Networks
Saleem, Salman
Rehman, Humaira
Khan et.al.,, Imran
Reliable communication between transmitter and receiver is accomplished by cooperative diversity techniques. Sending of data in various paths has greatly improved the performance of communication. We have studied the performance of Amplify-and-Forward (AF) based network in this work for diverse relay location at Nakagami, Rician and Rayleigh fading channels. The relay performance in Amplify-and-Forward (AF) protocol based on Symbol Error Rate (SER) against Signal-to-Noise Ratio (SNR) in dBs is calculated. The software that is used to construct Monte-Carlo link level simulation is MATLAB. The effects of a relay at changed location in diverse channels accompanied with Additive White Gaussian noise (AWGN) is also calculated. BPSK modulation scheme is used for the transfer of information between the source, relay and destination node. The signals are combined through Maximum Ratio Combining method (MRC).Reliable communication between transmitter and receiver is accomplished by cooperative diversity techniques. Sending of data in various paths have greatly improved the performance of communication. We have studied the performance of Amplify-and-Forward (AF) based network in this work for diverse relay location at Nakagami, Rician and Rayleigh fading channels. The relay performance in Amplify-and-Forward (AF) protocol based on Symbol Error Rate (SER) against Signal-to-Noise Ratio (SNR) in dBs is calculated. The software that is used to construct Monte-Carlo link level simulation is MATLAB. The effects of relay at changed location in diverse channels accompanied with Additive White Gaussian noise (AWGN) is also calculated. BPSK modulation scheme is used for the transfer of information between the source, relay and destination node. The signals are combined through Maximum Ratio Combining method (MRC).
VFAST-Research Platform
2015-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/385
VAWKUM Transactions on Computer Sciences; Vol. 3 No. 1 (2015): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/390
2020-10-04T03:07:16Z
VTCS:ART
"160728 2016 eng "
2308-8168
2411-6335
dc
Identification and Verification of Vehicle using RFID Technique
Durani, Aqib Mehmood
Department of Computing and Technology Abasyn University Peshawar, Pakistan http://www.abasyn.edu.pk/
Ali, Mumtaz
Department of Computer Science, City University Peshawar, Pakistan
Ahmad, Rameez
Department of Computing and Technology Abasyn University Peshawar, Pakistan http://www.abasyn.edu.pk/
Irfan, Syed
Department of Computing and Technology Abasyn University Peshawar, Pakistan http://www.abasyn.edu.pk/
Rehman, Habib ur
Department of Computing and Technology Abasyn University Peshawar, Pakistan http://www.abasyn.edu.pk/
The number of vehicles/traffic is increasing exponentially day-by-day, due to which automatic vehicles identification/monitoring system is being paid significance all over the world. Different countries in the world are using various types of automatic systems for traffic control, vehicles identification. Number plate recognition (NPR) is an authentic-time embedded system which frequently recognition the number plate of vehicle. Pervious systems are using only for identification of vehicle. The proposed system cumulates both the RFID (Radio Frequency Identification) and NPR systems for the identification and verification of vehicle.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/390
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/398
2020-10-04T03:07:16Z
VTCS:ART
"160409 2016 eng "
2308-8168
2411-6335
dc
Applications, Limitations, and Improvements in Visible Light Communication Systems
Khan, Fazlullah
Department of Computer Sciences, Abdul Wali Khan University Mardan
Khan, Farman
2Department of Computer Science, Bacha Khan University Charsadda, Pakistan
Jabeen, Qamar
Department of Computer Sciences, Abdul Wali Khan University Mardan
Jan, Syed Roohullah
Department of Computer Sciences, Abdul Wali Khan University Mardan
Khan, Shehzad
Department of Computer Sciences, Abdul Wali Khan University Mardan
Wireless communication networks using unlicensed frequency band faces certain challenges like unrestrained interfering and bad quality of transmission. To surmount the scarcity of frequency band, a new technique for wireless communication is compulsory to adapt the exponentially rising wireless communication demand. Visible light communication systems (VLCS) offer a replacement to the existing standards of wireless communication, through light from light-emitting diodes (LEDs) as the mean of communication. As LEDs twinkle repeatedly at a high speed such that human eye cannot perceive changes in light intensity, but a perceptive photodiode detect the on-off attitude and can interpret the data implanted within the light. This paper investigates different issues in the existing wireless communication networks, and studies how VLCS can resolve these issues, and proposes design of the VLCS. Moreover, applications, solution to current issues and future improvements are discussed in this paper.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/398
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/404
2022-04-20T12:35:38Z
VTCS:ART
"160322 2016 eng "
2308-8168
2411-6335
dc
GAIT RECOGNITION PROGRESS IN RECOGNIZING IMAGE CHARACTERISTICS
KHAN, ASADULLAH
Ahmad, F
KHAN, YASER DAANIAL
HE, DAOJING
Naseer, Mudasser
We present a humans credentials system centered on ambulation characteristics. This problem is as eminent as acoustic gait recognition. The objective of the scheme is to explore sounds radiated by walking persons (largely the musical note sounds) and identifies those folks. A cyclic model topology is engaged to denote individual gait cycles. This topology permits modeling and detecting individual steps, leading to very favorable identification rates.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/404
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/412
2020-10-04T03:07:16Z
VTCS:ART
"160513 2016 eng "
2308-8168
2411-6335
dc
Classification of Android Malware Applications using Feature Selection and Classification Algorithms
Altaher, Altyeb
Faculty of Computing and Information Technology in Rabigh, King Abdul Aziz University
Smartphones have become a potential part of our lives, and this led to a continued increase in the number of smartphone users. The growing number of users attracts hackers to develop malware applications to steal the private information and causing potential financial losses. Due to the fast modifications in the technologies used by malware developers, there is an urgent need for more advanced techniques for malware detection. In this paper, we propose an approach for Android malware classification based on features selection and classification algorithms. The proposed approach uses the permissions used in the Android app as features, to differentiate between the malware apps and goodware apps. The information gain algorithm is used to select the most significant permissions, then the classification algorithms NaivBayes, Random Forest and J48 used to classify the Android apps as goodware or malware apps. The experimental results show that random forest algorithm achieved the highest precision of 0.898 with a lowest false positive rate of 0.110.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/412
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/430
2020-10-04T03:09:46Z
VTCS:ART
"170211 2017 eng "
2308-8168
2411-6335
dc
Efficient Algorithm for Vertical Handover in Heterogeneous Wireless Mobile Network
Ullah, Zakir
University of Engineering and Technology Peshawar
Alamgir, Shazada
University of Engineering and Technology Peshawar
Khan, Alamgir
University of Engineering and Technology Peshawar
Saleem, Salman
University of Engineering and Technology Peshawar
Khan, Imran
University of Engineering and Technology Peshawar
This paper present the new idea of Vertical handover for heterogeneous Wireless Networks, based on different parameters values i.e, available Bandwidth, received signal strength, mean number of request per unit time, mean number of calls served per unit time, power deception, power consumption, network condition, duration for mobile station to present in network .Three network selected for the handover, the vertical handover is take place at best resulted network between the available networks. In this article, provoked with facts and figure which done by vertical handoff procedure on mobile nodes But the crucial parameters which is battery power may also consider highly for certain mobile nodes, call blocking probability of networks are define to make decision for network with good quality, for the proposed algorithm experiment results are shown between the available networks and parameters, graphically illustrate the vertical handover to the specific network.
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/430
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/434
2020-10-04T03:07:17Z
VTCS:ART
"161020 2016 eng "
2308-8168
2411-6335
dc
Web Users Clustering Based on Fuzzy C-MEANS
Ali, Waleed
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Kingdom of Saudi Arabia
Alrabighi, Mohammed
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Kingdom of Saudi Arabia
The Web contributes greatly to our life in many fields such as education, entertainment, Internet banking, online shopping and software downloading. This has led to rapid growth in the number of Internet users, which resulting in an explosive increase in traffic or bottleneck over the Internet performance. This paper proposes a new approach to group users according to their Web access patterns. The proposed approach for grouping users is based on Fuzzy c-means technique, which allows web users to be assigned into more than one cluster or interest. Each web user has a degree of membership of belonging to each cluster. The experimental results showed that the web users were successfully clustered to similar groups very fast using Fuzzy-c-means. In addition, the Fuzzy-c-means performed well and became much better when the clusters number increased on two real Bo2 and NY datasets. The proposed intelligent web users clustering based on Fuzzy-c-means can be used for discovering users' interests in Web pages that can contribute in enhancing several approaches such as Web caching, Web pre-fetching and Web recommender systems that are recently used to improve the Web performance.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/434
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/435
2020-10-04T03:07:17Z
VTCS:ART
"161220 2016 eng "
2308-8168
2411-6335
dc
Intensity Inhomogeneity Correction Scheme for 3d-Dimensional Mri Brain Scans using Histogram Matching
Baguda, Yakubu Suleiman
Department of Information Systems, King Abdulaziz University, Rabigh, Saudi Arabia.
Baguda, Abubakar Suleiman
Department of Psychiatric, Abubakar Tafawa Balewa University Teaching Hospital, Nigeria
Baguda, Usman Suleiman
Department of Psychiatric, Abubakar Tafawa Balewa University Teaching Hospital, Nigeria
There has been an explosive growth in medical imaging industry with rapid development in imaging techniques. Magnetic resonance imaging (MRI) has increasingly been popular as a result of its significant role in examining the ever-changing activity of human brain. The image and resolution produced by MRI is quite detailed and can detect tiny changes of structures within the brain and human body at large. It has become the leading technology for examining the living brain at work. More importantly, it plays an extremely important role in diagnosing patient with Alzheimer’s disease in its early stage. In fact, this will dramatically assist in analyzing the brain scan images and identifying whether if there is any potential risk for developing Alzheimer’s disease. Quantifying the brain for Alzheimer’s patient on regular basis is very important so that to critically analyze and assess the rate at which the disease affect patient brain. However, the quality of the MRI scans can radically change due to environmental and atmospheric changes, and equipment ageing. Subsequently, this has a profound impact on the precision and accuracy of the measurement of the brain. In this paper, we proposes an approach which eliminates the in homogeneity problem anticipated so that 3D brain MRI scans can be efficiently processed and analyzed
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/435
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/438
2020-10-04T03:07:17Z
VTCS:ART
"161221 2016 eng "
2308-8168
2411-6335
dc
An Evaluation Model of Tecaching Assistant using Artificial Neural Network
Osman, Ahmed Hamza
Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia
Nowadays, most of the academic institutes facing a low-quality problem in the educational field. One of these factors is an educational student achievement and staff teaching quality. This study presents an efficient framework for assessment and prediction of teachers’ performance in academic institutes using Artificial Neural Network (ANN) algorithm. The proposed framework designed to predict the performance quality level of teachers in order to improve the learning outcomes. The prediction model was tested effectively using the TA UCI dataset. The data consists of academic experiences for teachers as well as their experiences and grades of students in courses they taught among others. The SPSS tool was used to build the suggested prediction system. The TA data was dividing into three groups (70, 80, and 90) for training data, and (30, 20, and 10) for testing data respectively to study the dataset discrimination. The results are showing that the neural network obtained better accuracy results with (90%) in the training and (10%) in testing.
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/438
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/442
2020-10-04T03:07:17Z
VTCS:ART
"161011 2016 eng "
2308-8168
2411-6335
dc
Comparative Computational Analysis of a Putative Transcriptional Regulator Map_PRSO3010 and its implications in the Pathogenesis of Crohn’s and Johne’s diseases
Hassan, Syed Asif
Department of Computer Science, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
The implications of specific biochemical and structural features of many putative virulence factors in the pathogenesis of MAP in ruminant and human being are relatively less explored and understood. In this background, the comparative genomic and proteomic studies of MAP_PRSO3010, a putative protein shows that it shares a sequential, physiochemical, structural and functional similarity with Rv0757 (PhoP) protein, a virulent molecular determinant of Mycobacterium tuberculosis (Mtb). Conserved Domain Database (CDD) and InterPro studies demonstrate the presence of conserved domains namely Signal transduction response regulator, receiver domain (REC) and Transcription regulatory protein, C-terminal (Trans_reg_C) belonging to CheY-like and Helix Turn Helix (HTH) superfamily, respectively in both MAP_PRSO3010 and Rv0757 proteins. These domains are mainly involved in phosphorelay signal transduction and transcriptional regulation in response to unfavorable environments within host macrophages. Comparative in silico protein-protein interaction (PPI) studies also showed the involvement of common interacting proteins namely mtrA/B crucial for the survival of Mtb within host macrophages. The predicted hypothetical model of MAP_PRSO3010 protein provides an insight on the functional and structural resemblance between the two proteins. The model quality and structure assessment tools of Swiss-Model Server also validated the predicted hypothetical structure of MAP_PRSO3010 protein. Thus, these results show a strong relevance of MAP_PRSO3010 protein in MAP virulence
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/442
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/443
2020-10-04T03:07:16Z
VTCS:ART
"160812 2016 eng "
2308-8168
2411-6335
dc
Computational Approach to Design Antagonists of Mycobacterium Tuberculosis Lipoprotein Lprg (RV1411C) Protein
Hassan, Syed Asif
Department of Computer Science, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
Khan, Tabrej
Department of Information Systems, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
Hashmi, Arshad
Department of Information Systems, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
. Evolution of multi-drug resistance strains of Mycobacterium tuberculosis (MTB) has in the past caused severe epidemics of tuberculosis across the globe thereby it raises a question on the potency or efficacy of the current scaffolds of drugs targeting MTB. Therefore, there an urgency to identify novel antimycobacterial compounds targeting proteins important for the viability of Multi-Drug-Resistant Tuberculosis (MDR-TB) strains. In this regard Mtb LprG (Rv1411c) a lipoprotein involved in the evasion of cell-mediated immune response within infected host macrophages is an important target for screening antimycobacterial compounds against Mtb. In the current study, a workflow involving ligand-based virtual screening namely USRCAT (Ultra Shape Recognition) and molecular docking studies were employed to identify novel antituberculosis compounds. Based on USRCAT and docking studies XPX an analog of triacylated glycolipid was screened as a promising lead molecule that shows higher specificity and binding affinity for Mtb LprG protein. Further, in vitro experimentations are required to testify the role of XPX as an anti-TB drug for the treatment of MDT-TB.
Keywords: Multi-drug Resistant Tuberculosis; Toll-like receptor 2 (TLR2); antagonist; Molecular docking; Virtual screening
VFAST-Research Platform
2016-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/443
VAWKUM Transactions on Computer Sciences; Vol. 4 No. 1 (2016): January-December
eng
Copyright (c)
oai:ojs.localhost:article/451
2017-10-19T03:41:18Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/452
2020-10-04T03:09:46Z
VTCS:ART
"170419 2017 eng "
2308-8168
2411-6335
dc
Computational Approaches to Identify a Derivative of Galardin as an Inhibitor of Mycobacterial Peptide Deformylase
Hassan, Syed Asif
Department of Computer Science, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
Tayubi, Iftekhar Aslam
Department of Computer Science, Faculty of Computing and Information Technology Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia
Abstract. The metalloenzyme peptide deformylase (PDF) catalyzes the elimination of the N-formyl group from N-terminal methionine upon translation, which is crucial for protein synthesis, growth, and survival of bacteria. In this context, we aim to identify potent derivatives of the known mycobacterial PDF (mPDF) inhibitors having better pharmacological properties than their parent compounds. Initially, BB-83698, Galardin, and LBK-611 known mPDF inhibitors were selected based on their binding affinity for mPDF using iGEMDOCK. Analogs of these three inhibitors were prepared. Further, the analogs were screened based on their oral bioavailability, pharmacokinetics properties, drug likeliness and binding energy. The post-screening analysis reveals that the analog, (2R)-N’-hydroxy-N-[(2S)-3-(5H-indol-3-yl)-1-oxopropan-2-yl]-2-(2-methylpropyl) butanediamide (CID5288446) of galardin interacts with residues GLN56, LEU107, HIS148, GLU149, and HIS152 near the vicinity of the active site (H132EXXH136) of mPDF protein with higher affinity as compared to its parent compound galardin. The prediction tool based upon structure-activity relationship reveals that the analog CID5288446 showed similar metalloproteinase activity with lesser toxic effects when compared to its parent compound galardin.
Keywords: Mycobacterial Peptide Deformylase (mPDF); structure-based virtual screening; fitness score; pharmacokinetics properties; drug likeliness; Inhibitors.
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/452
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/453
2020-10-04T03:09:46Z
VTCS:ART
"170616 2017 eng "
2308-8168
2411-6335
dc
Digital Image Encryption Implementations Based on AES Algorithm
AlRababah, Ahmad
KAU
Objectives: To increase needed for exchanging digital photos electronically, due to alarming demand for multimedia applications, and because of the increasing use of images in electronic processes. Hence, the need for protection by unauthorized user is necessary. Method: This paper primarily is focusing on the necessary protection of these images using a specific analyzes algorithm: Advanced Encryption Standard (AES) with a full its description, which is known as an algorithm (Rijndael). Findings: It will be determined the address decryption, which is made up of different styles in all encryption and decryption steps in order to protect the valuable information. This algorithm will be implemented on MATLAB software programming. Application: The above results and analysis for this crypto system based on AES algorithm give a high performance. So we have reason to believe that use this method to encrypt the image will have a very good prospect in the future.
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/453
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.localhost:article/455
2022-04-22T06:40:58Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/462
2020-10-04T03:09:46Z
VTCS:ART
"170712 2017 eng "
2308-8168
2411-6335
dc
Video Metrics and Parameters for Achieving Optimal Quality in Low Delay Communication Networks
Baguda, Yakubu Suleiman
Department of Information Systems, King Abdulaziz University, Rabigh,
Aljahdali, Hani
Department of Information Systems, King Abdulaziz University, Rabigh
The need for optimal video quality over low delay communication networks is very crucial as their demand increases dramatically. Analysing, evaluating and exploring the codec metrics which can enhance the video quality when transporting the video over low delay communication networks has been a key issue of concern which requires thorough simulation and experimentation. Metrics such as quantization size, frame rate and frame size can significantly enhance the quality video. In this paper, the impacts of frame size, frame rate and quantization parameter on the compressed video quality has been investigated. More extensive simulations have been conducted in order to experiment different scenarios using various video samples at different frame sizes, quantization parameters, loss rate and encoding rate as well. More importantly, both low, medium and high complexity video samples have been examined to determine the impact of the aforementioned parameters on fundamental basic parameters which are essential toward yielding high-quality video while compressing videos. The experimental results show that increase in quantization parameter reduces the bits size and consequently leads to high compression.
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/462
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/470
2020-10-04T03:09:46Z
VTCS:ART
"170924 2017 eng "
2308-8168
2411-6335
dc
Toward a Better Assessment of Students Outcomes using a Six-Steps method and a Class Diagram
Boucetta, Samir K
IT Department, Faculty of Computing and Information Technology in Rabigh,
King Abdulaziz University, Saudi Arabia
The achievement of the ABET Students Outcomes (SOs) aims to ensure the good preparation of the students to the workplace. The evaluation of the SOs attainment faces many problems including the partial achievement of SO and the appropriate mapping of the assessment tools to SOs. Furthermore, the complexity and heaviness of the evaluation process require a 2-4 years improvement cycle to avoid faculty overloading. In this work, initially, a class diagram is developed which shows the classes of the system, their attributes, operations and the relationships among objects. Further, we propose a six-steps methodology that aims to better undertake the assessment of the SOs for an IT program. The first step proceeds to the preparation of an articulation matrix that maps the IT program courses to the SOs. The second step decomposes each SO into its Elementary contents (SOEs) in order to target each SOE separately and contribute to the full achievement of the SO. The detailed articulation matrix is prepared in the third step to include the new list of SOEs. While undertaking the semester-based assessments, the fourth step consists in mapping the assessment tools and questions to the appropriate SOEs using the Bloom's measurable verbs. At the end of the semester, the fifth step is undertaken to input the assessment data for each SOE. The final sixth step proceeds to the analysis of the assessment data to outline important results at both course and program levels. This work is undertaken at the Faculty of Computing and Information Technology in Rabigh (FCITR), King Abdulaziz University, and will be soon supported by a web-based system that helps in the implementation of the six-steps methodology, which will considerably shorten the improvement cycle.
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/470
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/471
2020-10-04T03:09:46Z
VTCS:ART
"171203 2017 eng "
2308-8168
2411-6335
dc
LSI Based Search Technique: Using Extracted Keywords and Key-Sentences
Ahmad, Shakeel
Faculty of Computing and Information Technology in Rabigh (FCITR) King Abdul Aziz University (KAU) Jeddah Saudi Arabia
Saqib, Sheikh Muhammad
Institute of Computing and Information Technology Gomal University
Almagrabi, Alaa Omran
Department of Information Systems, Faculty of Computing and Information Technology (FCIT) King Abdul Aziz University (KAU) Jeddah
Alotaibi, Fahad Mazaed
Faculty of Computing and Information Technology in Rabigh (FCITR) King Abdul Aziz University (KAU) Jeddah
Now a day bulk of information available on Internet but in spite of will, no one can go through all these information, which may carry huge amount of data. Hence, most of the web surfer required a mechanism through which particular documents or sentences of their interests can be extracted easily without wasting much amount of time. For this purpose, we can generate some keywords out of the stored information, so that keywords requested by the end user should match easily with stored keywords to detect sentences. In this context, Latent Semantic Indexing (LSI) based search method has been applied to whole text and keys. It has been observed through the results that the method with keys (Keywords and key-Sentences) found considerably proficient. Moreover, extracted Keys are not only suited for searching but also appropriate for clustering. Finally, the proposed study not only investigated the detection of keywords but also involved exposure of key sentences
VFAST-Research Platform
2017-10-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/471
VAWKUM Transactions on Computer Sciences; Vol. 5 No. 1 (2017): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/480
2022-04-22T06:40:58Z
VTCS:ART
"180315 2018 eng "
2308-8168
2411-6335
dc
A Data Specific Comparative Study for Choosing Best Cryptographic Technique
Usman, Muhammad
Department of Computer Science, University of Management and Technology, Punjab
Awan, Shahid M
Department of Computer Science, University of Management and Technology, Punjab
Data security has gauged much attention for over a past few decades. Cryptography is one of the most serious domains as far as security is concerned. This article evaluates and compares among few of the well-known state of art cryptographic algorithm like AES, DES and Serpent depending on the nature of data by different authors in different years. Benchmark techniques (True Positive rate, False Positive rate, ROC curves etc) are used to analyze the sensitivity and specificity for the respective algorithms. Paper is concluded with the best possible algorithm that suits a respective dataset.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/480
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/485
2022-04-22T06:40:58Z
VTCS:ART
"180330 2018 eng "
2308-8168
2411-6335
dc
Virtual Classroom an Easy and Low Cost Solution to E-Learning System
Ali, Syed Farooq
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Tahir, Hamza
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Khan, Zafar
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
E-Learning and Virtual Classroom applications have gained a lot of popularity due to growing population, easy access and low cost solution. The study in this paper proposes an open source Virtual Classroom application that tends to mimic all the functionalities and features of real class room. Its interface designs are based on the online learning theories. It will provide the students and teachers a real time virtual platform, where they can learn, share and properly propagate their knowledge, views and ideas. This open source application allows the faculty members to conduct all the class activities as if they are in a real classroom. On the other hand, students have the advantage of raising questions during the lecture with the help of a chat box and a whiteboard. In order to assess the interfaces of this application, Microsoft Visual Studio 2012 has been used. Our application provides security and reliability to all its users. All the courses, students and faculty members are managed in a real-time using this application. Administrator handles all these procedures and has all the rights over the system including the users and databases.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/485
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/486
2022-04-22T06:40:58Z
VTCS:ART
"180330 2018 eng "
2308-8168
2411-6335
dc
Cartoonization, Caricature and Emotion Generation from A Single Intensity Frontal Facial Image
Ali, Syed Farooq
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Zafar, Fahad
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Zafar, Fahad
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Zafar, Hafsa
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Zafar, Hafsa
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Naeem, Dima
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Naeem, Dima
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Pervaiz, Irum
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Pervaiz, Irum
Department of Software Engineering, University of Management and Technology, Lahore, Punjab
Interest in research activities in facial processing especially cartoonization, caricature and emotion generation have gradually increased over the recent years. The contribution of this paper is threefold. First, it provides an algorithms along with its results in which exaggerated cartoon like effects are added into a single facial frontal image according to the given cartoon template. The cartoon formed in this process will have similar features as of original image. Secondly, the study provides facial transformation algorithms and techniques to generate various artifacts and emotions including sad, shy, happy, blank, serious, surprise and innocent. Thirdly, the study discusses different transformation algorithms to generate various caricatures from the single frontal facial image. The output images generated using these open source algorithms and techniques are also provided in this paper to assess their subjective quality.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/486
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/487
2022-04-22T06:40:58Z
VTCS:ART
"180330 2018 eng "
2308-8168
2411-6335
dc
A Comparative Analysis of Traditional and Cloud Data Warehouse
Rehman, Khawaja Ubaid ur
Department of Computer Science, University of Management and Technology, Lahore, Punjab
Ahmad, Umair
Department of Computer Science, University of Management and Technology, Lahore, Punjab, Pakistan
Mahmood, Sajid
Department of Informatics and Systems, University of Management and Technology, Lahore, Punjab
In the age of emerging technologies, the amount of data is increasing very rapidly. With the passage of time, the methods of data handling are getting improved. Prediction analysis is quite a tough task, but it also yields interesting results. Different sectors like financial services, transportation, health and education are generating large amount of data. The emergence of web 2.0 (social web) made it possible for users and researchers to analyze and predict huge amount of data. The domain of Business Intelligence is core technology for users who want to extract useful information for decision making regarding their businesses. Data warehouse provides an insight into the business processes using the historical data. However, traditional data warehouse may not be suitable for the data analysis needs because of the evolving requirement of industry. It cannot be scaled up or down. Moreover, it cannot handle the increasing number of users. A new kind of data warehouse with design and implementation aspects has been emerged, called as cloud data warehouse. The cloud data warehouse model has evolved with the passage of time, which affects the application and business domains as well. The cloud data warehouse has evolved to control the large scale data. It can be scaled up or down at any time and also it has no limitation on increasing number of users. In this review paper, we have compared traditional and cloud data warehouse. We can conclude that the ultimate future of data warehouse is cloud data warehouse.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/487
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/488
2022-04-22T06:40:58Z
VTCS:ART
"180302 2018 eng "
2308-8168
2411-6335
dc
Brain Tumor Detection by Using Computer Vision Based on Multi-Level Image Filteration
Rehman, Saba
Department of Computer Sciences, University of Management and Technology, Lahore
Shahzad, Iqra
Department of Computer Sciences, University of Management and Technology, Lahore
MRI imaging assumes an essential part in brain tumor for conclusion, investigation and treatment arranging. Brain tumor identification is the procedure of the situating of tumor and size. It helps the specialist for deciding the past strides of mind tumor.in this paper, we utilize distinctive methods to obviously distinguish the tumor region from MRI picture. In our approach utilize two level of separating systems these altered half and half middle channel and middle filtering.as the clamor is evacuated we upgrade the picture quality by enhancing dim level of every pixel utilizing KNN mean calculation. The improved picture used to discover the limits of conceivable mind tumor within pictures by identifying discontinuities in the shine. The picture division into a conceivable tumor and non-tumor zones. and afterward sharp both conceivable districts unmistakably envisioned the two regions in brain picture.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/488
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/489
2020-10-04T12:30:40Z
VTCS:ART
"190130 2019 eng "
2308-8168
2411-6335
dc
Voting System using Android Operating System
Hassan, Syed Ali
Department of Computer Sciences, University of Management and Technology, Lahore
Anwar, Mohsin
Department of Computer Sciences, University of Management and Technology, Lahore
In the normal ballot process, voting condition is troublesome in light of dislike of voters to go for voting to polling stations coming from far places, stay in long queues and sit tight drawn out for their turn. A couple of individuals settle on wrong decision which cause star choice issues. This customary strategy for voting can be switched to a more progressive and beneficial approach entitle Mobile-Voting system. We propose wonderful, essential and organized way to deal with vote, shedding the insufficiencies of regular approach. By using the customer id and mystery word against one CNIC, one voter can settle on one decision. If one person has the right to vote then a voting structure is displayed to him and approval is finished by using One Time Password (OTP) rule, thumb impression and face affirmation. Advancement of technology can be used to provide benefit to the people who vote but face difficulties during this process. To give permission of utilization of this right, all over the world where the voting through mobile is conducting have some common steps like voter verification and confirmation, counting and checking of votes, announcement of result. In the proposed system each voter is affirmed by the CNIC, OTP, thumb impression and face affirmation. Each vote caste against a candidate is placed in the database for the individual dispute. At end of the ballot casting system the counter checks the total ballot caste against each candidate and makes a short report of it and give it to the admin. Admin has access to share these results with everyone who has the ballot casting application.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/489
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/514
2022-04-22T06:40:58Z
VTCS:ART
"180716 2018 eng "
2308-8168
2411-6335
dc
Effects of Refactoring and Design Patterns on The Software Source Code Quality : An Empirical Assessment
Raees, Muhammad Shahid
National University of Computer and Emerging Sciences NUCES-FAST, Lahore, Punjab, Pakistan
Ashraf, Muhammad Adeel
Department of Computer Science, University of Management and Technology, Lahore, Punjab, Pakistan
The purpose of this research is to identify the impact of refactoring techniques and design patterns on the source code of the Data management application. The research methodology used for this research is first identify the source code bad smells and then remove them by apply refactoring techniques and design patterns. To evaluate the impact of refactoring and design patterns on the source code quality; the code metrics and visual studio 2015 community edition is used to evaluate code metrics. The results of this research shows that the applying refactoring and design patterns in a combination has a positive effect on the source code quality. The code reusability, expandability and understandability will be increased.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/514
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/515
2022-04-01T11:55:56Z
VTCS:ART
"191216 2019 eng "
2308-8168
2411-6335
dc
Theoretical Framework of Agent Assisted Treatment for ASD (Autism Spectrum Disorder)
Butt, Danyal Hussain
Department of Computer Sciences, National College of Business Administration & Economics
Lahore, Pakistan
Khan, Wasim Ahmad
Department of Computer Sciences, National College of Business Administration & Economics
Lahore, Pakistan
kids with Autism Spectrum problems (ASD) have conversation deficits and problems with social interaction. A lack of social conduct can bog down healing interventions and may lessen the potential to examine social talents. Robots had been shown to initiate proactive social conduct in youngsters with ASD. improvement of robot systems able to appearing as catalysts for social conduct in the context of ASD remedy is the need of contemporary era. A methodology and theoretical framework is being supplied here in this paper for a robotic system that can not only compare the effects and stage of ASD, however, can assist the victim consequently.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/515
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/516
2022-04-01T11:55:56Z
VTCS:ART
"191216 2019 eng "
2308-8168
2411-6335
dc
Algorithms for Data Cleaning in Knowledge Bases
Ashraf, Adeel
Department of Computer Science, University of Management and Technology, Punjab, Pakistan
Ilyas, Sarah
Department of Computer Science, University of Management and Technology, Punjab, Pakistan
Rehman, Khawaja Ubaid ur
Department of Computer Science, University of Management and Technology, Punjab, Pakistan
Ahmad, S
Department of Computer Sciences, Faculty of Computing and Information Technology in Rabigh, King Abdul Aziz University Jeddah
Data cleaning is an action which includes a process of correcting and identifying the inconsistencies and errors in data warehouse. Different terms are uses in these papers like data cleaning also called data scrubbing. Using data scrubbing to get high quality data and this is one the data ETL (extraction transformation and loading tools). Now a day there is a need of authentic information for better decision-making. So we conduct a review paper in which six papers are reviewed related to data cleaning. Relating papers discussed different algorithms, methods, problems, their solutions, and approaches etc. Each paper has their own methods to solve a problem in an efficient way, but all the paper have a common problem of data cleaning and inconsistencies. In these papers data inconsistencies, identification of the errors, conflicting, duplicate records etc problems are discussed in detail and also provided the solutions. These algorithms increase the quality of data. At ETL process stage, there are almost thirty-five different sources and causes of poor quality constraints.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/516
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/518
2022-04-22T06:40:58Z
VTCS:ART
"180716 2018 eng "
2308-8168
2411-6335
dc
Effectiveness of Agile Development Frameworks with Respect to Testing
Ghani, M.Ahmad Nawaz ul
Department of Computer Science, University of Management And Technology, Lahore
Farooq, M. Shoaib
Department of Computer Science, University of Management And Technology, Lahore
Zahid, Amjad Hussain
Department of Computer Science, University of Management And Technology, Lahore
Software Development Life Cycle models are used as the basis to design software applications. In these models, there exists some tribulations and to overcome these defects, agile models are presented. The mature software applications of agile development utilize both iterative and incremental style. It can be viewed as a response against conventional procedural activity. It is viewed not as to meet the volatility and varying situations but as the modern business ethics for software development. By examining and exploring the agile models, it has been found that efficiency of agile models can be improved. This research investigates the agile frameworks (DSDM and LSD) in terms of testing. It also examines that the effectiveness of dynamic systems development model (DSDM) from testing perspective. The results show the performance of DSDM agile framework and the estimated efficiency of this framework.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/518
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/519
2022-04-22T06:40:58Z
VTCS:ART
"180716 2018 eng "
2308-8168
2411-6335
dc
An Exposition of Wireless Sensor Network Area Coverage and Lifetime Based on Meta Heuristic and Particle Swarm Optimization Algorithms
Farooq, Asif
University of Lahore
Iqbal, Tahir
Bahria University Lahore campus, Lahore
An important issue among the most vital and essential issues in Wireless Sensor Networks (WSNs) is the area coverage problem. This issue in WSNs causes the security situations directed by the current sensors in the systems suitably. The significance of scope in WSNs is important to the point that is one of the natures of administration parameters. In the event that the sensors don't suitably cover the physical situations they won't be sufficient proficient in supervision and controlling. The scope in WSNs must be in a manner that the vitality of the sensors would be the slightest to build the lifetime of the system. Alternate reasons which had expanded the significance of the issue are the topological changes of the system finished by the harm or cancellation of a percentage of the sensors and now and again the system should not lose its scope. Along these lines, in this paper we have half and half algorithm, the Meta-Heuristic calculations like Differential Evolution and Particle Swarm Optimization algorithms and have broken down the range scope issue in WSNs. Additionally PSO algorithm is executed to look at the productivity of the half and half model in the same circumstances. The consequences of the trials demonstrate that the half and half algorithm has made more increment in the lifetime of the system and more upgraded utilization of the vitality of sensors by improving the scope of the sensors in comparison to PSO.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/519
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/521
2022-04-01T11:55:56Z
VTCS:ART
"191204 2019 eng "
2308-8168
2411-6335
dc
GPGPU Virtualization Techniques a Comparative Survey
Alyas, M
Department of Computer Sciences, School of Systems and Technology, University of Management
& Technology,Lahore, Pakistan
Hassan, Hamid
Department of Computer Sciences, School of Systems and Technology, University of Management
& Technology, Lahore, Pakistan
The Graphic Processing Units (GPU) are being adopted in many High Processing Computing (HPC) facilities because of their massively parallel and extraordinary computing power, which makes it possible to accelerate many general purpose implementations from different domains. A general-purpose GPU (GPGPU) is a GPU that performs computations that were traditionally handled by central processing unit (CPU) to accelerate applications along with handling traditional computations for graphics rendering. However, GPUs have some limitations, such as increased acquisition costs as well as larger space requirements, more powerful energy supplies, and their utilization is usually low for most workloads. That results in the need of GPU virtualization to maximize the use of an acquired GPU to share between the virtual machines for optimal use, to reduce power utilization and minimize the costs. This study comparatively reviews the recent GPU virtualization techniques including API remoting, para, full and hardware based virtualization, targeted for general-purpose accelerations.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/521
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/522
2022-04-22T06:40:58Z
VTCS:ART
"181104 2018 eng "
2308-8168
2411-6335
dc
Facial Emotion Detection through Deep Covolutional Neural Networks
Dar, Aymun Saif
School of Systems and Technology, University of Management and Technology, Lahore
Naseer, Sheraz
School of Systems and Technology, University of Management and
Technology, Lahore, Pakistan
Ali, Aihtshan
School of Systems and Technology, University of Management and
Technology, Lahore, Pakistan
Sauf, Ishmal
School of Systems and Technology, University of Management and
Technology, Lahore, Pakistan
Ahsan, Muhammad
School of Systems and Technology, University of Management and
Technology, Lahore, Pakistan
Our society has evolved to a threshold where use of machines to automate mundane tasks is constantly increasing in daily life. Providing machines with capability to develop perception from their environment can lead them to perform a great variety of tasks. Facial emotion detection is crucial sub-part of machine perception development. In this article we present a deep learning based approach for Facial emotion Detection. Our model uses a Convolutional Neural Network (CNN) to learn deep features for classification of facial images into one of 22 emotion (Basic 7 + Compound 15) categories considered in this study. We trained our CNN model with the images dataset from Martinez et al. Our Facial Emotion Detection model was developed using keras with theano backend and implemented on a GPU-powered testbed. Our model achieved 67.6% accuracy for basic emotions and 33% accuracy for compound emotions.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/522
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/523
2022-04-22T06:40:58Z
VTCS:ART
"181104 2018 eng "
2308-8168
2411-6335
dc
A Parellel two Stage Classifier for Breast Cancer Prediction and Comparison with Various Ensemble Techniques
Nagi, Ali Tariq
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Wali, Ahmad
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Shahzada, Adnan
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Ahmad, Muhammad Masroor
Department of Computer Sciences, Capital University of Science and Technology, Islamabad, Pakistan
Life is a blessing but some diseases snatch human life away before even they are being diagnosed. One such horrifying disease is cancer. Among cancer, the most leading and common type is breast cancer. The actual problem lies in the fact that it is very hard and time consuming for even the most experienced medical specialist to detect the disease with high accuracy but the machines and modern computer science techniques have increased the accuracy and reduced the amount of time taken to diagnose cancer. In the subject paper, a new parallel machine learning technique called the two-stage classifier for identifying breast cancer is presented and compared with various existing techniques in terms of accuracy and percentage error reduction. The proposed technique turns out to be better not only in terms of parallelism but also in terms of the evaluated metrics and reduced the error percentage to almost 50% in one of the cases.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/523
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/524
2022-04-01T11:55:56Z
VTCS:ART
"191104 2019 eng "
2308-8168
2411-6335
dc
A Survey of Computer Aided Diagnosis (Cad) of Liver in Medical Diagnosis
Farooq, Shoaib
Department of Computer Sciences, University of Management and Technology, Lahore
Khan, Zoya
Department of Computer Sciences, University of Management and Technology, Lahore Pakistan
In the modern World, diseases may occur at any time. Early diagnosis can prevent the serious consequences of the disease. The Computer Aided Diagnosis has very positively influenced the medical field. It helps the Radiologists to diagnose the diseases very quickly, precisely and accurately. The earlier diagnosis can help doctors to cover further spreading of the disease and to overcome at all. In this paper presented the following step to implements the Diagnosis process including the image preprocessing, Feature Extraction, Segmentation and classification. There are different techniques used in Image Segmentation like Fuzzy-C-Mean (FCM) Algorithm, Thresholding, Watershed Clustering Method and Region Growing etc. Feature extraction is the second phase that includes the calculation of different features of segmented lesion. It transforms the data that is in high-dimensional space to some extent of lesser dimensions. This is the final phase the classification phase that which is deals the Measurement of feature that are used the input to support the vector machine in last classify the lesion. This paper works of Computer Aided Diagnosis on liver lesion has briefly described.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/524
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/525
2022-04-22T06:40:58Z
VTCS:ART
"181104 2018 eng "
2308-8168
2411-6335
dc
Generating Corpus for Evaluating Performance of Process Matching Techniques
Asmat, Ayesha
Department of Computer Science, University of Management and Technology, Lahore
Iftikhar, Afnan
Department of Informatics and Systems, University of Management and Technology, Lahore, Pakistan
Business process management (BPM) plays a vital role in organizations management. A central piece to that is the collection of business process models. Depending upon the size of the organization, the collection may have many process models in the process repository. A key feature to such a repository is searching of process models which requires computing similarity between a pair of process models. For a given pair of process models, similarity refers to finding whether the two process models that form the pair are similar or not. To compute the similarity between process models, several techniques have been established however a rigorous evaluation of these techniques has either not been conducted on numerous occasions or the evaluation has not been sufficiently rigorous. A key reason to that is the absence of a benchmark set of queries and their relevant process models, as a judge by human experts. In this study, we argue, the fewer queries used for evaluation may not have the necessary diversity to challenge the abilities of the matching techniques. This work is usually not done due to a large number of manual comparisons. It is thus required a pool of queries. A related challenge is to identify a pool of process models that are declared as relevant to the query models. To address these challenges, we have suggested a technique.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/525
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/528
2022-04-01T11:55:56Z
VTCS:ART
"201004 2020 eng "
2308-8168
2411-6335
dc
Attacks Analysis of TCP And UDP Of UNCW-NB15 Dataset
Shah, Asghar Ali
Department of Computer Science, University of Management and Technology,Lahore
Khan, Yaser Danial
Department of Computer Science, University of Management and Technology,Lahore, Pakistan
Ashraf, Muhammad Adeel
Department of Computer Science, University of Management and Technology,Lahore, Pakistan
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most important protocols in complete protocol architecture. There are many types of attacks that can block the communication or reduce the performance of a protocol. This study provides a detail analysis of TCP and UDP attacks and their application layer protocols. The authors will also suggest that where the security administrator should focus for providing best security. The old datasets such as KDD99 and NSLKDD has many limitations. This study uses UNSW-NB15 dataset which has recently been generated.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/528
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/533
2020-10-04T12:30:40Z
VTCS:ART
"191222 2019 eng "
2308-8168
2411-6335
dc
A NEW RELATION IN Q-POCHHAMMER SYMBOL WITH APPLICATIONS
Ashraf, Aneela
University of the Punjab
Mahmood, Muhammad Khalid
Punjab University http://pu.edu.pk/faculty/description/421/Dr-Muhammad-Khalid-Mahmood.html
In this paper, we propose and investigate a new relation in q-Pochhammer symbol. Further, we establish q-bracket, q-factorial and q-binomial coefficient in term of q-Pochhammer symbol using our proposed relation. As an application, we express q-Pochhammer symbols in term of ordinary equations to define new surface graphs.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
application/vnd.openxmlformats-officedocument.wordprocessingml.document
https://vfast.org/journals/index.php/VTCS/article/view/533
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/534
2022-04-22T06:40:58Z
VTCS:ART
"181222 2018 eng "
2308-8168
2411-6335
dc
NOVEL INVESTIHATIONS IN Q-POCHHAMMER SYMBOL
Ashraf, Aneela
University of the Punjab
In this paper, we propose and examine a new relation in -Pochhammer symbol. Further, we set up -section, -factorial and -binomial coefficient in term of -Pochhammer symbol utilizing our proposed connection.
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/534
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/541
2022-04-22T06:40:58Z
VTCS:ART
"181126 2018 eng "
2308-8168
2411-6335
dc
Performing Subjectivity Classification in Text Using Support Vector Machine
Almagrabi, Alaa Omran
Department of Information Systems, Faculty of Computing and Information Technology (FCIT) King Abdul Aziz University (KAU) Jeddah, Kingdom of Saudi Arabia
In this paper, I address the problem of the subjectivity classification in text. The subjective text is opinion bearing, whereas the objective text is text without expressing opinions. The supervised learning technique namely, Support Vector Machine (SVM) is used to classify the text as subjective and objective. A publically available dataset of drug reviews is used to conduct the experiments using WEKA platform. The experimental results show that the proposed SVM classifier performed better than the other classifiers
VFAST-Research Platform
2018-10-10 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/541
VAWKUM Transactions on Computer Sciences; Vol. 6 No. 1 (2018): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/542
2020-10-04T12:30:40Z
VTCS:ART
"190127 2019 eng "
2308-8168
2411-6335
dc
Several Adaptive Replica Synchronization Approaches for Distributed file System
Ather, Saher
Department of Computer Sciences, National University of Computer and Emerging Sciences (FAST-NU), Faisalabad, Pakistan
Muslin-Ud-Din, Hooria
Department of Computer Sciences, National University of Computer and Emerging Sciences (FAST-NU), Lahore, Pakistan
Nabeel, Muhammad
Department of Software Engineering, University of Management and Technology, Lahore, Pakistan
Ahsan, Muhammad
Department of Software Engineering, University of Management and Technology, Lahore, Pakistan
Hassan, Bilal
Department of Software Engineering, University of Management and Technology, Lahore, Pakistan
This survey paper explained the different approaches of synchronization of replicas of files placed on distributed systems. The survey tells some older and latest techniques of synchronization. Some techniques are by the interference of metadata servers and some are without any intrusion of MDS. In former technique SS storage servers are used for synchronization among replicas. To maximize the performance, scalability and reliability CEPH is a distributed file system. It makes distinction between meta data and data management by object storage file system run on object file systems. Excellent I/O and metadata management is done on CEPH. Commodity servers and disks are used for multitier distributed systems. Performance reliability, I/O rate, workload in writes operations and less overhead in synchronization are the main focus while synchronization of replicas. Hadoop and Google file system are the distributive file systems. Hadoop ensures the better input and output performance with minimal synchronization in replicas, data intensive applications and provides fault tolerance. Some strategies are used for data intensive applications. Parallel file system is type of distributed file system. Analysis enforces the best performance on small and large input output requests. Pattern direct and layout replication technique is one of the most optimized techniques for parallel file system. Data access performance, reliability, data consistency, centralized synchronization, less workload, less overhead is the main focus of all the techniques. Some other file systems like SOFA and frangipani do focus on data consistency and reduce of bandwidth.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/542
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/543
2020-10-04T12:30:40Z
VTCS:ART
"191227 2019 eng "
2308-8168
2411-6335
dc
Anomaly Based Intrusion Detection System Which Analyze the Dataset and Detect Intrusion
Aziz, Muhammad Hamza
Department of Computer Sciences, Bahria University, Lahore, Pakistan
Shah, Asghar Ali
Department of Computer Sciences, Bahria University, Lahore, Pakistan
As the research increased in computer science highlight the scientists mind for the growing research world towards security. Researchers have done a lot of research work in network Security. Cybersecurity has progressively become a zone of alarm for officials, Government agencies and industries, including big commercialized infrastructure, are under attack daily. First signature-based intrusion detection systems were developed, and it detects only novel attacks. To detect strange attacks statistical IDS came into being recognized as anomaly-based IDS. It is not as much efficient as it detects all. In this, study the author focus on the efficiency of IDS using NSL-KDD99 dataset and support vector machine (SVM) technique to identify attacks. NSL-KDD dataset is used for the evaluation of these type of systems.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/543
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/544
2020-10-04T12:30:40Z
VTCS:ART
"190127 2019 eng "
2308-8168
2411-6335
dc
Multicamera Video Stitching Surveillance System
Ali, Ahsan
Department of Computer Science, Bahria University, Lahore
Shah, Asghar Ali
Department of Computer Science, Bahria University, Lahore, Pakistan
Aftab, Kashif
Department of Computer Science, Bahria University, Lahore, Pakistan
Usman, Muhammad
Department of Computer Science, Bahria University, Lahore, Pakistan
CCTV cameras are commonly used for security issues. Pan-tilt-zoom (PTZ) cameras are mostly used for this purpose. To stitch two or more video streams from different cameras is much cheaper than PTZ solution. There are three stages of video stitching. Feature identification is the first stage of video stitching. To scale the invariant features like rotation, scaling and noise etc. Direct and feature base identification has basically two types of feature identification. Shifting and warping the images purpose to identify how these features are agreeing with each other is the main concern for direct base identification. While feature identification rely on extracting the features and then perform matching among them on the base of features. Calibration is the second stage of the video stitching. The images are stitch in panoramic way in calibration depending upon alignment among them. Blending is the last stage of video stitching where numerous videos are display in single panoramic way. Any blending algorithm is used to blend the pixels together and for final view.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/544
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/545
2020-10-04T12:30:40Z
VTCS:ART
"190116 2019 eng "
2308-8168
2411-6335
dc
Classification Of Twitter’s Data To Get Gender Identification
Ali, Waqas
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Hassan, Malik Tahir
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Raza, Syed Fawad
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
Fiaz, Usman
Department of Computer Science, University of Management and Technology, Lahore, Pakistan
This paper describes the accuracy of various algorithms for classification of text on the basis of gender identification. We examined the knowledge extracted from corpus of Twitter's online social media in term of gender identity. By comparing algorithms on different feature sets, we established a feature set of 20 distinct arguments which increase the correctness of gender identification on all over the twitter. We reported accuracies of three algorithms obtained by using two approaches applied on two classes of gender i.e. male and female; a model where a lot of features are reduced using powerset transformation.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/545
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/547
2022-03-28T11:38:12Z
VTCS:ART
"211128 2021 eng "
2308-8168
2411-6335
dc
New Approach to Distributed Flood Prediction Model using Agents based Communication
Qasim, Naveed
Department of Computer Sciences, Abdul Wali Khan University Mardan, Pakistan
Flood is the overflow of water from its normal ways to submerges land which is usually dry. It is clear that floods cannot be stopped, but the timely prediction and management is the only way to combat this hazard. Much work is documented on physical and logical solution to predict on the basis of risk to save people and reduce the destruction of their belongings. In this work we developed a logical model based on client and server agent communication to predict the hazard. In the process, initially a conceptual model is developed, further, an algorithm is constructed. Moreover, for it correctness and verification the algorithm is transformed to formal language Z. Finally the specified formal model is implemented using JAVA programming language.
VFAST-Research Platform
2021-09-06 14:36:43
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/547
VAWKUM Transactions on Computer Sciences; Vol. 9 No. 1 (2021): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/551
2020-10-04T12:30:40Z
VTCS:ART
"190405 2019 eng "
2308-8168
2411-6335
dc
Classifying Text-Based Emotions Using Logistic Regression
Alotaibi, Fahad Mazaed
Faculty of Computing and Information Technology in Rabigh (FCITR) King Abdul Aziz University (KAU) Jeddah Saudi Arabia
Emotion detection textual content is getting popular among individuals and business companies to analyze user emotional reaction on the products they use. In this work, emotion detection from textual content is performed by using supervised learning-based Logistic Regression classifier. ISEAR dataset is used to taring the classifier, while testing dataset is used to evaluate the prediction capability of the classifier for emotion classification. The prior works used rule-based techniques, supported by lexical resources. However, limited coverage of emotional clues, was the major issue, which resulted in poor performance of system. The proposed work overcomes this limitation by proposing supervised learning technique using Logistic Regression classifier. The results obtained are encouraging and show that the proposed system performed better than the similar methods.
VFAST-Research Platform
2019-09-04 00:00:00
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/551
VAWKUM Transactions on Computer Sciences; Vol. 7 No. 1 (2019): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/555
2022-04-01T11:55:56Z
VTCS:ART
"201004 2020 eng "
2308-8168
2411-6335
dc
Promising Compounds for Treatment of Covid-19
Khan, Yasir Daanial
Department of Computer Science, School of Systems and Technology, University of Management and Technology, Lahore
Roomi, Muhammad Sohaib
Department of Computer Science, School of Systems and Technology, University of Management and Technology, Lahore
The study spans over-identification of phytochemicals suited for the treatment of COVID-19. The study focuses on the chemical that has a tendency to bind with Human ACE2 protein and two of the main Sars-Cov-2 proteins which are the Spike protein and the RNA-directed RNA polymerase (RdRp) protein. After screening a large list of phytochemicals two of the compound i.e. Kansuinine B and Digitoxin were found to have promising traits for the treatment of COVID-19. Both the compounds have been in use for centuries. Digitoxin was extracted from Foxglove seeds in the 18th century for heart-related illnesses. Kansuinine B originates from a Chinese herb Euphorbia Kansui (E. Kansui) E. Kansui has been widely used in herbal medicine for a multitude of illnesses including lungs related diseases. Studies also show that it has the ability to suppress cytokine response through the expression of the SOCS3 gene. In-silico simulations show that both these compounds have a better affinity and binding properties with these three proteins as compared to many other drugs under trial for COVID-19 like Remdesivir, Ritonavir, Famotidine, Camostat Mesylate, and Hesperidin. A treatment based on the combination of both compounds can be very effective. Any self-medication of both the compounds is highly discouraged as misuse of both the compounds can be very harmful.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/555
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.localhost:article/582
2022-04-01T11:55:56Z
VTCS:ART
oai:ojs.pkp.sfu.ca:article/585
2022-04-01T11:55:56Z
VTCS:ART
"201222 2020 eng "
2308-8168
2411-6335
dc
Prediction of Saudi Arabia SARS-COV 2 Diversifications in Protein Strain Against China Strain
Albugami, Nasser
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University Jeddah, Saudi Arbia
The recent outbreak of a COVID-19 pandemic infecting millions of people has sparked a global health emergency. It was named SARS-COV2 because of its generic similarity to the existing SARS-COV of the 2003 coronavirus pandemic. Scientists work to find the effective vaccine for its prevention and, on the other hand, work on its origin, mutation, and evolution to determine its severity from area to area is also under great concern. In this work, focused on the second part, proposes the identification of protein strains associated with the locality in Saudi Arabia as opposed to strains associated with China. For this purpose, the data of both countries were collected from the UniProt database. The identification was carried out by using machine learning, in which the biological data was transformed to numerical form by a hybrid approach using Amino Acid Composition (AAC) and Statistical Moment, and further classifications are carried out using Random Forest and SVM. For the model evaluation, 10-Fold validation and the Jackknife test were applied and achieved high accuracy. These results of high predictions reveal the noticeable variation in both the set of sequences, which shows diversification between coronavirus strains of both the countries Saudi Arabia and China which are the clear indication of sequence mutation.
VFAST-Research Platform
2020-10-04 17:37:39
application/pdf
text/plain
text/plain
https://vfast.org/journals/index.php/VTCS/article/view/585
VAWKUM Transactions on Computer Sciences; Vol. 8 No. 1 (2020): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/604
2022-04-01T09:42:11Z
VTCS:ART
"210906 2021 eng "
2308-8168
2411-6335
dc
A Survey of Feature Extraction and Feature Selection Techniques used in Machine Learning-Based Botnet Detection Schemes
Oyelakin, Akinyemi Moruff
Department of Computer Science, Al-Hikmah University, Ilorin, Nigeria https://www.alhikmah.edu.ng
G, Jimoh Rasheed
Department of Computer Science, University of Ilorin, Ilorin, Nigeria
Machine learning techniques have been widely used for the classification of botnets as they have been argued to have improved strengths compared to signature-based approaches. The level of performances of some of these detection schemes have been traced to the relevance of the features used for the classification models. Therefore, extraction and selection of the most discriminative features in the classification of botnets is an important research area. It has equally been found that when a Machine-learning based approach is being used to identify botnets, the dataset chosen has to be real and representative. Feature extraction and Feature Selection are necessary steps prior to using a Machine Learning-based classification algorithm for identifying botnets. The reason for the pre-processing and feature selection steps in Machine Learning-based model is to be able to remove irrelevant and redundant data in the experimental dataset, minimize computational complexity, and increase both model simplicity as well as accuracy. This paper provided a survey of various feature extraction and feature selection methods that have been used by researchers that proposed Machine-Learning based botnet detection models. The main purpose of this approach is to provide a better understanding and insights on how improved botnet detection mechanisms can be achieved through enhanced feature extraction and selection methods.
VFAST-Research Platform
2021-09-06 14:36:43
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/604
VAWKUM Transactions on Computer Sciences; Vol. 9 No. 1 (2021): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1000
2022-03-28T11:38:12Z
VTCS:ART
"211202 2021 eng "
2308-8168
2411-6335
dc
Discrimination of SARS-COV2 virus protein strain of three major affected countries: USA, China, and Germany
Allehaibi, Khalid
Department of Computer Sciences, Faculty of Computing and Information Technology, King Abdulaziz University Jeddah, Saudi Arabia
In this paper, we discuss the discrimination of SARS-COV2 viruses associated with three major affected countries the USA, China, and Germany. The discrimination can reveal the mutation as the result of viral transmission and its spread due to mutation associated with its protein structure which makes small changes in the Spike protein. To investigate the mutation in SARS-COV2, we downloaded the protein strains associated with the USA, China, and Germany from the UniProtKB by advance search through SARS-COV2, country name, and protein name: Accessory protein 7b, 6, ORF3a, 10, 8 protein, Envelope small membrane protein, Nucleoprotein, Membrane protein, Spike glycoprotein, 3C-like proteinase, and 2'-O-methyltransferase. After retrieving the protein sequences, we transform the biological form of sequences to their equivalent numerical form by using statistical moments. Further classification algorithms like Random Forest, SVM are used for their training and classification. Finally, performance evaluation is carried out using K-fold cross-validation, independent testing, self-consistency, and jackknife testing. The result received through all testing is more than 97%, which shows the visible discrimination among the protein strains of mentioned countries, which shows the strong mutation in SARS-Cov2 sequences.
VFAST-Research Platform
2021-09-06 14:36:43
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/1000
VAWKUM Transactions on Computer Sciences; Vol. 9 No. 1 (2021): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1001
2022-03-28T11:38:12Z
VTCS:ART
"211205 2021 eng "
2308-8168
2411-6335
dc
Specification of Operating Rules for Water Reservoir to Manage Flood Using Z-Notation
Alam, Hasrat
AWKUM UCSS Computer Science Department
Flood is natural event; it brings a lot of destruction. Due to flood not only loss of human life and misery of millions of people occur, but tremendous damages occur in public and private property. It cannot be stopped, but can be managed to save the lives and property of the people. To manage a flood, there are two solutions, physical and logical. In physical solutions, different physical constructions are made to manage flood like levee, channel improvement, flood ways, and widening of barrages, but these control works have many deficiencies. In logical solutions, models and techniques are developed to manage the flood, however, these systems also have some deficiencies. To overcome the deficiencies in the existing models, we focus on to develop a flood management model consisting of an off-river reservoir and diverted canals having regulators. Reservoirs are most effective water storage that smooth down extreme inflow. The optimal operations of reservoirs determine the release and accumulation of water over time. For effective operative decision, operating rules will be defined in Z-Specification. For these operating rules, we will develop an algorithm, will verify the rules in Z-Notation and will implement them in the Java programming language.
VFAST-Research Platform
2021-09-06 14:36:43
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/1001
VAWKUM Transactions on Computer Sciences; Vol. 9 No. 1 (2021): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1004
2022-03-28T11:38:12Z
VTCS:ART
"220328 2022 eng "
2308-8168
2411-6335
dc
Analyzing updates in Amino Acid Composition and Translation Algorithm towards Predicting Membrane Proteins using Machine Learning Approaches
Alfarsi, Abdulsalam Mohammed
Department of Information Technology, Faculty of Computing and Information Technology in Rabigh, King Abdelaziz University. Jeddah, Saudi Arabia
Alghanmi, Abdulrahman Mohammed
Department of Information Technology, Faculty of Computing and Information Technology in Rabigh, King Abdelaziz University. Jeddah, Saudi Arabia
Membrane proteins are of different types that take on different functions. Classification of protein sequences in a data set is very important for understanding cell functions, disease prevention, and drug discovery. Initially, traditional methods were used for transmembrane protein classification. However, due to advanced technology and new research, it increases the transmembrane protein datasets by thousands which are almost impossible to obtain accurate results based on traditional methods. Computational methods are very useful for membrane protein classification. Several methods such as Pseudo Amino Acid Composition (PseAAC) can extract many silent features of a protein sequence. In this work, we intended to modify an existing algorithm of amino acid composition and translation to extract membrane protein features with better accuracy. To validate our algorithm, we will use the Support Vector Machine SVM and KNN.
VFAST-Research Platform
2021-09-06 14:36:43
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/1004
VAWKUM Transactions on Computer Sciences; Vol. 9 No. 1 (2021): January-December
eng
Copyright (c)
oai:ojs.pkp.sfu.ca:article/1177
2023-03-13T13:34:54Z
VTCS:ART
"220630 2022 eng "
2308-8168
2411-6335
dc
K-Nearest Neighbor Classifier for Classifying user Reviews on Social Media Networks
Alotaibi, Fahad
Department of Information System, King Adulaziz University, Jaddah, KSA
Alromema, Nashwan Ahmed
1-Department of Information System, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah Saudi Arabia
2-Department of Software Engineering, Faculty of Computing, Universiti Teknologi Malaysia, Skudai Johor, Malaysia http://www.nalromema.kau.euu.sa
Gigantic content generated on social media networking sites have made the online users enabled to communicate their opinions and sentiments about products and other entities like political events etc. Opinion mining applications aim to provide facilities to user and companies for know about products in which they are interested. In this work, opinion mining system for comparative reviews is developed using supervised machine learning approach. For this purpose, K-nearest neighbor classifier is trained on a publicly available dataset. Effectiveness of the system is validated by comparing its performance with other classifiers.
VFAST-Research Platform
2022-12-23 05:47:37
application/pdf
https://vfast.org/journals/index.php/VTCS/article/view/1177
VAWKUM Transactions on Computer Sciences; Vol. 10 No. 1 (2022): January-June
eng
Copyright (c)
oai:ojs.localhost:article/1236
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1237
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1238
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1239
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1240
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1241
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1242
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1243
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1244
2022-12-17T22:29:57Z
VTCS:ART
oai:ojs.localhost:article/1245
2022-12-17T22:29:57Z
VTCS:ART
4787181c07e3e2e4f866f39e71c87833